EP2916483A1 - Transaction system and transaction method - Google Patents

Transaction system and transaction method Download PDF

Info

Publication number
EP2916483A1
EP2916483A1 EP13850096.2A EP13850096A EP2916483A1 EP 2916483 A1 EP2916483 A1 EP 2916483A1 EP 13850096 A EP13850096 A EP 13850096A EP 2916483 A1 EP2916483 A1 EP 2916483A1
Authority
EP
European Patent Office
Prior art keywords
transaction data
electronic signature
transaction
signature token
signed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP13850096.2A
Other languages
German (de)
French (fr)
Other versions
EP2916483A4 (en
Inventor
Dongsheng Li
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tendyron Corp
Original Assignee
Tendyron Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tendyron Corp filed Critical Tendyron Corp
Publication of EP2916483A1 publication Critical patent/EP2916483A1/en
Publication of EP2916483A4 publication Critical patent/EP2916483A4/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • the present disclosure relates to a field of information security, and more particularly relates to a transaction system and a transaction method.
  • an identity authentication for a user is required.
  • an electronic signature token is increasingly applied in many occasions (such as the bank transaction, the network transaction). At present, there is only one electronic signature token corresponding to an individual user or an enterprise user. If a transaction is performed by using this electronic signature token, there are following problems.
  • the present disclosure seeks to solve at least one of the above problems.
  • the transaction system includes: a first electronic signature token, configured to sign a first signature on transaction data so as to obtain first signed transaction data, and to send the first signed transaction data; a network bank server, configured to receive the first signed transaction data sent by the first electronic signature token, to verify the first signed transaction data, and to send the transaction data if the first signed transaction data is successfully verified; and at least one second electronic signature token, configured to receive the transaction data sent by the network bank server, to verify the transaction data, to receive a user confirmation if the transaction data is successfully verified, to sign a second signature on the transaction data so as to obtain second signed transaction data, and to send the second signed transaction data to the network bank server, in which the network bank server is further configured to verify the second signed transaction data, and to perform a transaction if the second signed transaction data is successfully verified.
  • a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by the network bank server, so as to complete the transaction.
  • first electronic signature token and the second electronic signature token are working together to perform the transaction, and there may be one or more second electronic signature tokens, such that the transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
  • Embodiments of another aspect of the present disclosure provide a transaction method.
  • the transaction method comprises sending by a first electronic signature token first signed transaction data to a network bank server; verifying by the network bank server the first signed transaction data, and sending the transaction data to at least one second electronic signature token if the first signed transaction data is successfully verified; indicating by the at least one second electronic signature token the transaction data for confirming by a user; receiving by the at least one second electronic signature token a user confirmation input by the user after confirming that the transaction data is correct; signing by the at least one second electronic signature token a second signature on the transaction data to obtain at least one second signed transaction data and sending the at least one second transaction data to the network bank server; and verifying by the network bank server the at least one second signed transaction data, and performing a transaction if the at least one second signed transaction data is successfully verified.
  • a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by a network bank server, so as to complete the transaction.
  • first electronic signature token and the second electronic signature token are working together to perform the transaction, and there may be one or more second electronic signature tokens, such that the signed transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
  • Any process or method described in a flow chart or described herein in other ways may be understood to include one or more modules, segments or portions of codes of executable instructions for achieving specific logical functions or steps in the process.
  • the flow chart shows a specific order of execution, it is understood that the order of execution may differ from what is depicted. For example, the order of execution of two or more boxes may be scrambled relative to the order shown.
  • Fig. 1 is a block diagram of a transaction system according to an embodiment of the present disclosure.
  • the transaction system comprises a first electronic signature token 100, a network bank server 200 and a second electronic signature token 300.
  • the first electronic signature token 100 is configured to sign a first signature on transaction data so as to obtain first signed transaction data, and to send the first signed transaction data to the network bank server 200.
  • a first signature may be signed on the transaction data of the transfer transaction by the first electronic signature token 100 to obtain the first signed transaction data, and then the first signed transaction data may be sent by the first electronic signature token 100 to the network bank server 200.
  • the first electronic signature token 100 may sign the first signature on the transaction data using a password input by the initiator.
  • the network bank server 200 is configured to receive the first signed transaction data sent by the first electronic signature token 100, to verify the first signed transaction data, and to send the transaction data to the second electronic signature token 300 if the first signed transaction data is successfully verified.
  • the second electronic signature token 300 is configured to receive the transaction data sent by the network bank server 200, to verify the transaction data, to receive a user confirmation if the transaction data is successfully verified, to sign a second signature on the transaction data so as to obtain second signed transaction data, and to send the second signed transaction data to the network bank server 200. Then, the network bank server 200 is further configured to verify the second signed transaction data, and to perform a transaction if the second signed transaction data is successfully verified.
  • Each transaction confirmation party may obtain the transaction data using his own second electronic signature token 300, and may press an enter key after inputting a password possessed by himself or may press the enter key directly.
  • the second electronic signature token 300 may sign the second signature on the transaction data according to the password input by the user or according to a predetermined cipher code obtained based on confirmation information sent by the enter key, and may send the second signed transaction data to the network bank server 200 for confirming the transaction. In this way, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of the enterprise user is kept by only one keeper may be avoided.
  • the network bank server 200 is further configured to receive a plurality of second signed transaction data sent by a plurality of second electronic signature tokens 300, to verify the plurality of second signed transaction data respectively and to perform the transaction if a predetermined percentage of the plurality of second signed transaction data is successfully verified.
  • the network bank server 200 receives five second signed transaction data sent by five second electronic signature tokens 300 respectively and verifies the five second signed transaction data respectively, and if three second signed transaction data is successfully verified, then the transaction is performed.
  • the network bank server 200 only receives three second signed transaction data sent by three second electronic signature tokens 300 and all the three second signed transaction data is successfully verified, then the transaction is performed.
  • the predetermined percentage may be preset by the user according to the user's requirement or may be a default value of the network bank server 200.
  • a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by a network bank server, so as to complete the transaction.
  • first electronic signature token and the second electronic signature token are working together to perform the transaction, and there are one or more second electronic signature tokens, such that the first signed transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
  • Fig. 2 is a block diagram of a transaction system according to another embodiment of the present disclosure.
  • the transaction system further comprises a first terminal 400 and a second terminal 500.
  • Each of the first terminal 400 and the second terminal 500 may be a smart phone, a tablet PC, a laptop, a personal computer and so on.
  • the first terminal 400 is configured to receive the first signed transaction data sent by the first electronic signature token 100, and to forward the first signed transaction data to the network bank server 200.
  • Each second terminal 500 corresponds to one second electronic signature token 300, and is configured to receive the transaction data sent by the network bank server 200, to forward the transaction data to the second electronic signature token 300, to receive the second signed transaction data sent by the second electronic signature token 300, and to forward the second signed transaction data to the network bank server 200.
  • the transaction data may be transmitted between the first electronic signature token and the network bank server via the first terminal, and may be transmitted between the second electronic signature token and the network bank server via the second terminal, such that an electronic transaction may be accomplished whenever and wherever the user wants, thus enhancing the convenience of the electronic transaction.
  • the first electronic signature token 100 is further configured to send a pre-stored identification of the first electronic signature token 100 to the network bank server 200, and the network bank server 200 is further configured to send the identification of the first electronic signature token 100 to the at least one second electronic signature token 300, and the at least one second electronic signature token 300 is further configured to confirm the identification of the first electronic signature token 100.
  • the pre-stored identification of the first electronic signature token 100 may be configured to determine an identity of the first electronic signature token 100 uniquely. Therefore, during the transaction, the network bank server 200 may determine the identity of the first electronic signature token 100 according to the identification of the first electronic signature token 100, such that an imposter may be prevented from sending transaction data, thus ensuring the security of the transaction.
  • the network bank server 200 is further configured to send a bank identification for the transaction to the at least one second electronic signature token 300, and the at least one second electronic signature token 300 is further configured to confirm the bank identification.
  • the bank identification is configured to determine an identity of the bank uniquely. Therefore, a person may be prevented from impersonating a bank to send transaction data, such that it is ensured that the transaction data is real data sent by a bank, thus improving the security of the electronic transaction and improving the user experience.
  • the present disclosure provides a transaction method.
  • Fig. 3 is a flow chart of a transaction method according to an embodiment of the present disclosure.
  • the transaction method may comprise following steps.
  • first signed transaction data is sent by a first electronic signature token to a network bank server.
  • a first signature may be signed on the transaction data of the transfer transaction by the first electronic signature token to obtain the first signed transaction data, and then the first signed transaction data may be sent by the first electronic signature token to the network bank server.
  • the first electronic signature token may sign the first signature on the transaction data using a password input by the initiator.
  • the first electronic signature token may send the first singed transaction data to a first terminal firstly, and then the first signed transaction data is sent to the network bank server by the first terminal.
  • the first signed transaction data is verified by the network bank server, and the transaction data is sent to at least one second electronic signature token if the first signed transaction data is successfully verified.
  • the network bank server may send the transaction data to at least one second terminal firstly, and then the transaction data is sent to the at least one second electronic signature token by the at least one second terminal respectively.
  • Each of the first electronic signature token and the at least one second electronic signature token may be a secret key device such as a USB key.
  • Each second terminal corresponds to one second electronic signature token.
  • Each of the first terminal and the second terminal may be a smart phone, a tablet PC, a laptop, a personal computer and so on.
  • the transaction data is indicated by the at least one second electronic signature token for confirming by a user.
  • Each transaction confirmation party may obtain the transaction data by the second electronic signature token possessed by himself.
  • the second electronic signature token may indicate the transaction data for confirming by the user by displaying or broadcasting the transaction data.
  • step S304 a user confirmation input by the user after confirming that the transaction data is correct is received by the at least one second electronic signature token.
  • the user confirmation may be sent by the user through pressing an enter key directly or pressing the enter key after inputting a password.
  • a second signature is signed by the at least one second electronic signature token on the transaction data to obtain at least one second signed transaction data and the at least one second transaction data is sent respectively by the at least one electronic signature token to the network bank server.
  • the second electronic signature token verifies whether the password is correct firstly. And if the password is correct, the second electronic signature token signs the second signature on the transaction data according to the password to obtain the second signed transaction data, and sends the second signed transaction data to the network bank server. If the user confirmation is sent by the user through pressing the enter key directly, the second electronic signature token signs the second signature on the transaction data according to a predetermined cipher code so as to obtain the second signed transaction data, and sends the second signed transaction data to the network bank server.
  • the at least one second signed transaction data is verified by the network bank server, and a transaction is performed if the at least one second signed transaction data is successfully verified.
  • the transaction when the network bank server verifies the plurality of second signed transaction data sent by the plurality of second electronic signature tokens, the transaction may be performed if a predetermined percentage of the plurality of second signed transaction data is successfully verified. For example, the network bank server receives five second signed transaction data sent by five second electronic signature tokens and verifies the five second signed transaction data respectively, and if three second signed transaction data is successfully verified, then the transaction is performed.
  • the predetermined percentage may be preset by the user according to the user's requirement or may be a default value of the network bank server.
  • a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by a network bank server, so as to complete the transaction.
  • first electronic signature token and the second electronic signature token are working together to perform the transaction, and there may be one or more second electronic signature tokens, such that the transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
  • Fig. 4 is a flow chart of a transaction method according to another embodiment of the present disclosure.
  • the transaction method comprises following steps.
  • first signed transaction data is sent by a first electronic signature token to a network bank server.
  • the first signed transaction data is verified by the network bank server, and the transaction data and a bank identification corresponding to a transaction are sent to at least one second electronic signature token if the first signed transaction data is successfully verified.
  • the bank identification is configured to determine an identity of the bank uniquely.
  • step S403 the bank identification is verified by the at least one second electronic signature token respectively, and the transaction data is indicated for confirming by a user after the bank identification is successfully verified.
  • a user confirmation input by the user after confirming that the transaction data is correct is received by the at least one second electronic signature token.
  • a second signature is signed by the at least one second electronic signature token on the transaction data to obtain at least one second signed transaction data and the at least one second transaction data is sent respectively by the at least one second electronic signature token to the network bank server.
  • the at least one second signed transaction data is verified by the network bank server, and the transaction is performed if the at least one second signed transaction data is successfully verified.
  • an identity of the bank may be determined uniquely from the bank identification. Therefore, a person may be prevented from impersonating a bank to send transaction data, such that it is ensured that the transaction data is real data sent by a bank, thus improving the security of the electronic transaction.
  • Fig. 5 is a flow chart of a transaction method according to yet another embodiment of the present disclosure.
  • the transaction method may comprise following steps.
  • first signed transaction data and a pre-stored identification of a first electronic signature token are sent by the first electronic signature token to a network bank server.
  • the identification of the first electronic signature token may be configured to determine an identity of the first electronic signature token uniquely.
  • the first signed transaction data is verified by the network bank server, and the transaction data and the identification of the first electronic signature token are sent to at least one second electronic signature token if the first signed transaction data is successfully verified.
  • the transaction data and the identification of the first electronic signature token are indicated by the at least one second electronic signature token for confirming by a user the transaction data and an identity of an initiator initiating the transaction.
  • a user confirmation input by the user after confirming that the transaction data and the identity of the initiator are correct is received by the at least one second electronic signature token.
  • a second signature is signed by the at least one second electronic signature token on the transaction data to obtain at least one second signed transaction data and the at least one second transaction data is sent to the network bank server.
  • the at least one second signed transaction data is verified by the network bank server, and the transaction is performed if the at least one second signed transaction data is successfully verified.
  • the network bank server may determine an identity of the first electronic signature token according to the identification of the first electronic signature token, such that an imposter may be prevented from sending transaction data, thus ensuring the security of the transaction.
  • a combination of the transaction method illustrated in Fig. 4 and the transaction method illustrated in Fig. 5 may be implemented, that is, the identification of the first electronic signature token and the bank identification are used together to further ensure the security of a transaction.

Abstract

Provided are a transaction system and a transaction method. The transaction system comprises: a first electronic signature tool for making a first signature on transaction data and sending the transaction data subjected to the first signature to a network bank server; the network bank server for receiving the transaction data sent by the first electronic signature tool having been subjected to the first signature and performing authentication thereon, and sending the transaction data to at least one second electronic signature tool after the authentication has passed; and the at least one second electronic signature tool for receiving the transaction data sent by the network bank server, performing verification on the transaction data, receiving confirmation information input by a user after the verification has passed, and making a second signature on the transaction data and sending the transaction data having been subjected to the second signature to the network bank server. The present invention ensures the security of a transaction process, realizes remote transaction in the case that a transaction initiation party and a transaction confirmation party are not present simultaneously, and is convenient to use and strong in security.

Description

    FIELD
  • The present disclosure relates to a field of information security, and more particularly relates to a transaction system and a transaction method.
  • BACKGROUND
  • In order to ensure the security of information in a bank transaction and a network transaction, an identity authentication for a user is required. As a device for verifying the user's identity, an electronic signature token is increasingly applied in many occasions (such as the bank transaction, the network transaction). At present, there is only one electronic signature token corresponding to an individual user or an enterprise user. If a transaction is performed by using this electronic signature token, there are following problems.
    1. (1) There is a hidden danger that money in an enterprise account is transferred without permission since the electronic signature token of the enterprise user is kept by only one keeper.
    2. (2) When the enterprise user performs an electronic transaction, the keeper of the electronic signature token must be present, otherwise the electronic transaction cannot be accomplished. Thus, it is inconvenient for the enterprise user due to the keeper's absence.
    SUMMARY
  • The present disclosure seeks to solve at least one of the above problems.
  • Accordingly, embodiments of an aspect of the present disclosure provide a transaction system. The transaction system includes: a first electronic signature token, configured to sign a first signature on transaction data so as to obtain first signed transaction data, and to send the first signed transaction data; a network bank server, configured to receive the first signed transaction data sent by the first electronic signature token, to verify the first signed transaction data, and to send the transaction data if the first signed transaction data is successfully verified; and at least one second electronic signature token, configured to receive the transaction data sent by the network bank server, to verify the transaction data, to receive a user confirmation if the transaction data is successfully verified, to sign a second signature on the transaction data so as to obtain second signed transaction data, and to send the second signed transaction data to the network bank server, in which the network bank server is further configured to verify the second signed transaction data, and to perform a transaction if the second signed transaction data is successfully verified.
  • With the transaction system according to embodiments of the present disclosure, a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by the network bank server, so as to complete the transaction. Since the first electronic signature token and the second electronic signature token are working together to perform the transaction, and there may be one or more second electronic signature tokens, such that the transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
  • Embodiments of another aspect of the present disclosure provide a transaction method. The transaction method comprises sending by a first electronic signature token first signed transaction data to a network bank server; verifying by the network bank server the first signed transaction data, and sending the transaction data to at least one second electronic signature token if the first signed transaction data is successfully verified; indicating by the at least one second electronic signature token the transaction data for confirming by a user; receiving by the at least one second electronic signature token a user confirmation input by the user after confirming that the transaction data is correct; signing by the at least one second electronic signature token a second signature on the transaction data to obtain at least one second signed transaction data and sending the at least one second transaction data to the network bank server; and verifying by the network bank server the at least one second signed transaction data, and performing a transaction if the at least one second signed transaction data is successfully verified.
  • With the transaction method according to embodiments of the present disclosure, a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by a network bank server, so as to complete the transaction. Since the first electronic signature token and the second electronic signature token are working together to perform the transaction, and there may be one or more second electronic signature tokens, such that the signed transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
  • Additional aspects and advantages of embodiments of present disclosure will be given in part in the following descriptions, become apparent in part from the following descriptions, or be learned from the practice of the embodiments of the present disclosure.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • These and other aspects and advantages of embodiments of the present disclosure will become apparent and more readily appreciated from the following descriptions made with reference to the accompanying drawings, in which:
    • Fig. 1 is a block diagram of a transaction system according to an embodiment of the present disclosure;
    • Fig. 2 is a block diagram of a transaction system according to another embodiment of the present disclosure;
    • Fig. 3 is a flow chart of a transaction method according to an embodiment of the present disclosure;
    • Fig. 4 is a flow chart of a transaction method according to another embodiment of the present disclosure;
    • Fig. 5 is a flow chart of a transaction method according to yet another embodiment of the present disclosure.
    DETAILED DESCRIPTION
  • Reference will be made in detail to embodiments of the present disclosure, where the same or similar elements and the elements having same or similar functions are denoted by like reference numerals throughout the descriptions. The embodiments described herein with reference to drawings are explanatory, illustrative, and used to generally understand the present disclosure. The embodiments shall not be construed to limit the present disclosure.
  • In the description of the present disclosure, it should be understood that, terms such as "first" and "second" are used herein for purposes of description, and are not intended to represent or indicate relative importance or significance or to represent or indicate numbers or locations. In the description of the present disclosure, it should be understood that, unless specified or limited otherwise, terms such as "connected" and "coupled" should be understood broadly, and may be, for example, fixed connections, detachable connections, or integral connections; or may be mechanical or electrical connections; or may be direct connections or indirect connections via intervening structures, which can be understood by those skilled in the art according to specific situations. Moreover, in the description of the present invention, unless specified otherwise, "a plurality of" means two or more than two.
  • Any process or method described in a flow chart or described herein in other ways may be understood to include one or more modules, segments or portions of codes of executable instructions for achieving specific logical functions or steps in the process. Although the flow chart shows a specific order of execution, it is understood that the order of execution may differ from what is depicted. For example, the order of execution of two or more boxes may be scrambled relative to the order shown.
  • In the following, a transaction system and a transaction method according to embodiments of the present disclosure will be described in detail with reference to drawings.
  • Fig. 1 is a block diagram of a transaction system according to an embodiment of the present disclosure.
  • As shown in Fig. 1, the transaction system according to embodiments of the present disclosure comprises a first electronic signature token 100, a network bank server 200 and a second electronic signature token 300. There is at least one second electronic signature token 300 in the transaction system, and each of the first electronic signature token 100 and the at least one second electronic signature token 300 may be a secret key device such as a USB key.
  • Specifically, the first electronic signature token 100 is configured to sign a first signature on transaction data so as to obtain first signed transaction data, and to send the first signed transaction data to the network bank server 200. For example, if an initiator initiates a transfer transaction, a first signature may be signed on the transaction data of the transfer transaction by the first electronic signature token 100 to obtain the first signed transaction data, and then the first signed transaction data may be sent by the first electronic signature token 100 to the network bank server 200. Of course, if the initiator initiates a transaction, the first electronic signature token 100 may sign the first signature on the transaction data using a password input by the initiator.
  • The network bank server 200 is configured to receive the first signed transaction data sent by the first electronic signature token 100, to verify the first signed transaction data, and to send the transaction data to the second electronic signature token 300 if the first signed transaction data is successfully verified.
  • The second electronic signature token 300 is configured to receive the transaction data sent by the network bank server 200, to verify the transaction data, to receive a user confirmation if the transaction data is successfully verified, to sign a second signature on the transaction data so as to obtain second signed transaction data, and to send the second signed transaction data to the network bank server 200. Then, the network bank server 200 is further configured to verify the second signed transaction data, and to perform a transaction if the second signed transaction data is successfully verified. In embodiments of the present disclosure, there may be one or more second electronic signature tokens 300. That is, when the transaction is performed, the transaction data may be verified and confirmed by one or more transaction confirmation parties. Each transaction confirmation party may obtain the transaction data using his own second electronic signature token 300, and may press an enter key after inputting a password possessed by himself or may press the enter key directly. The second electronic signature token 300 may sign the second signature on the transaction data according to the password input by the user or according to a predetermined cipher code obtained based on confirmation information sent by the enter key, and may send the second signed transaction data to the network bank server 200 for confirming the transaction. In this way, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of the enterprise user is kept by only one keeper may be avoided.
  • It should be understood that, in an embodiment of the present disclosure, in order to improve the execution efficiency of the transaction, the network bank server 200 is further configured to receive a plurality of second signed transaction data sent by a plurality of second electronic signature tokens 300, to verify the plurality of second signed transaction data respectively and to perform the transaction if a predetermined percentage of the plurality of second signed transaction data is successfully verified. For example, the network bank server 200 receives five second signed transaction data sent by five second electronic signature tokens 300 respectively and verifies the five second signed transaction data respectively, and if three second signed transaction data is successfully verified, then the transaction is performed. For another example, there are five second electronic signature tokens 300 in the transaction system, if the network bank server 200 only receives three second signed transaction data sent by three second electronic signature tokens 300 and all the three second signed transaction data is successfully verified, then the transaction is performed. The predetermined percentage may be preset by the user according to the user's requirement or may be a default value of the network bank server 200.
  • With the transaction system according to embodiments of the present disclosure, a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by a network bank server, so as to complete the transaction. Since the first electronic signature token and the second electronic signature token are working together to perform the transaction, and there are one or more second electronic signature tokens, such that the first signed transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
  • Fig. 2 is a block diagram of a transaction system according to another embodiment of the present disclosure.
  • As shown in Fig. 2, based on the transaction system illustrated in Fig. 1, the transaction system according to embodiments of the present disclosure further comprises a first terminal 400 and a second terminal 500. There may be one or more second terminals 500, and a number of the second terminals 500 is equal to a number of the second electronic signature tokens 300. Each of the first terminal 400 and the second terminal 500 may be a smart phone, a tablet PC, a laptop, a personal computer and so on.
  • The first terminal 400 is configured to receive the first signed transaction data sent by the first electronic signature token 100, and to forward the first signed transaction data to the network bank server 200.
  • Each second terminal 500 corresponds to one second electronic signature token 300, and is configured to receive the transaction data sent by the network bank server 200, to forward the transaction data to the second electronic signature token 300, to receive the second signed transaction data sent by the second electronic signature token 300, and to forward the second signed transaction data to the network bank server 200.
  • With the transaction system according to this embodiment, the transaction data may be transmitted between the first electronic signature token and the network bank server via the first terminal, and may be transmitted between the second electronic signature token and the network bank server via the second terminal, such that an electronic transaction may be accomplished whenever and wherever the user wants, thus enhancing the convenience of the electronic transaction.
  • In some embodiments of the present disclosure, the first electronic signature token 100 is further configured to send a pre-stored identification of the first electronic signature token 100 to the network bank server 200, and the network bank server 200 is further configured to send the identification of the first electronic signature token 100 to the at least one second electronic signature token 300, and the at least one second electronic signature token 300 is further configured to confirm the identification of the first electronic signature token 100. The pre-stored identification of the first electronic signature token 100 may be configured to determine an identity of the first electronic signature token 100 uniquely. Therefore, during the transaction, the network bank server 200 may determine the identity of the first electronic signature token 100 according to the identification of the first electronic signature token 100, such that an imposter may be prevented from sending transaction data, thus ensuring the security of the transaction.
  • In another embodiment of the present disclosure, the network bank server 200 is further configured to send a bank identification for the transaction to the at least one second electronic signature token 300, and the at least one second electronic signature token 300 is further configured to confirm the bank identification. The bank identification is configured to determine an identity of the bank uniquely. Therefore, a person may be prevented from impersonating a bank to send transaction data, such that it is ensured that the transaction data is real data sent by a bank, thus improving the security of the electronic transaction and improving the user experience.
  • In order to implement the above embodiments, the present disclosure provides a transaction method.
  • Fig. 3 is a flow chart of a transaction method according to an embodiment of the present disclosure.
  • As shown in Fig. 3, the transaction method according to embodiments of the present disclosure may comprise following steps.
  • At step S301, first signed transaction data is sent by a first electronic signature token to a network bank server.
  • For example, if an initiator initiates a transfer transaction, a first signature may be signed on the transaction data of the transfer transaction by the first electronic signature token to obtain the first signed transaction data, and then the first signed transaction data may be sent by the first electronic signature token to the network bank server. Of course, if the initiator initiates a transaction, the first electronic signature token may sign the first signature on the transaction data using a password input by the initiator.
  • In some embodiments of the present disclosure, the first electronic signature token may send the first singed transaction data to a first terminal firstly, and then the first signed transaction data is sent to the network bank server by the first terminal.
  • At step S302, the first signed transaction data is verified by the network bank server, and the transaction data is sent to at least one second electronic signature token if the first signed transaction data is successfully verified.
  • In some embodiments of the present disclosure, the network bank server may send the transaction data to at least one second terminal firstly, and then the transaction data is sent to the at least one second electronic signature token by the at least one second terminal respectively.
  • Each of the first electronic signature token and the at least one second electronic signature token may be a secret key device such as a USB key. Each second terminal corresponds to one second electronic signature token. Each of the first terminal and the second terminal may be a smart phone, a tablet PC, a laptop, a personal computer and so on.
  • At step S303, the transaction data is indicated by the at least one second electronic signature token for confirming by a user.
  • For example, one or more transaction confirmation parties may be required during the transaction. Each transaction confirmation party may obtain the transaction data by the second electronic signature token possessed by himself. The second electronic signature token may indicate the transaction data for confirming by the user by displaying or broadcasting the transaction data.
  • At step S304, a user confirmation input by the user after confirming that the transaction data is correct is received by the at least one second electronic signature token.
  • The user confirmation may be sent by the user through pressing an enter key directly or pressing the enter key after inputting a password.
  • At step S305, a second signature is signed by the at least one second electronic signature token on the transaction data to obtain at least one second signed transaction data and the at least one second transaction data is sent respectively by the at least one electronic signature token to the network bank server.
  • If the user confirmation is sent by the user through pressing the enter key after inputting the password, the second electronic signature token verifies whether the password is correct firstly. And if the password is correct, the second electronic signature token signs the second signature on the transaction data according to the password to obtain the second signed transaction data, and sends the second signed transaction data to the network bank server. If the user confirmation is sent by the user through pressing the enter key directly, the second electronic signature token signs the second signature on the transaction data according to a predetermined cipher code so as to obtain the second signed transaction data, and sends the second signed transaction data to the network bank server.
  • At step S306, the at least one second signed transaction data is verified by the network bank server, and a transaction is performed if the at least one second signed transaction data is successfully verified.
  • In some embodiments of the present disclosure, there may be one or more second electronic signature tokens. That is, when the transaction is performed, the transaction data may be verified and confirmed by one or more transaction confirmation parties. Each transaction confirmation party may obtain the transaction data by the second electronic signature token possessed by himself, and may input the password possessed by himself according to the transaction data. The second electronic signature token may sign the second signature on the transaction data according to the password so as to obtain second signed transaction data, and may send the second signed transaction data to the network bank server for confirming the transaction. In this way, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided.
  • In an embodiment of the present disclosure, when the network bank server verifies the plurality of second signed transaction data sent by the plurality of second electronic signature tokens, the transaction may be performed if a predetermined percentage of the plurality of second signed transaction data is successfully verified. For example, the network bank server receives five second signed transaction data sent by five second electronic signature tokens and verifies the five second signed transaction data respectively, and if three second signed transaction data is successfully verified, then the transaction is performed. The predetermined percentage may be preset by the user according to the user's requirement or may be a default value of the network bank server.
  • With the transaction method according to embodiments of the present disclosure, a first signature is signed on the transaction data by the first electronic signature token hold by an initiator initiating a transaction, and then the transaction data is sent to the second electronic signature token hold by a transaction confirmation party for confirmation after the signed transaction data is verified by a network bank server, so as to complete the transaction. Since the first electronic signature token and the second electronic signature token are working together to perform the transaction, and there may be one or more second electronic signature tokens, such that the transaction data may be verified and confirmed by one or more transaction confirmation parties, a hidden danger of unauthorized transfer caused by the fact that the electronic signature token of an enterprise user is kept by only one keeper may be avoided, the security of the transaction and the enterprise account may be guaranteed, and a remote transaction may be accomplished even if at least one of the initiator and the transaction confirmation party is not present, thus enhancing the security and convenience.
  • Fig. 4 is a flow chart of a transaction method according to another embodiment of the present disclosure.
  • As shown in Fig. 4, the transaction method according to embodiments of the present disclosure comprises following steps.
  • At step S401, first signed transaction data is sent by a first electronic signature token to a network bank server.
  • At step S402, the first signed transaction data is verified by the network bank server, and the transaction data and a bank identification corresponding to a transaction are sent to at least one second electronic signature token if the first signed transaction data is successfully verified. The bank identification is configured to determine an identity of the bank uniquely.
  • At step S403, the bank identification is verified by the at least one second electronic signature token respectively, and the transaction data is indicated for confirming by a user after the bank identification is successfully verified.
  • At step S404, a user confirmation input by the user after confirming that the transaction data is correct is received by the at least one second electronic signature token.
  • At step S405, a second signature is signed by the at least one second electronic signature token on the transaction data to obtain at least one second signed transaction data and the at least one second transaction data is sent respectively by the at least one second electronic signature token to the network bank server.
  • At step S406, the at least one second signed transaction data is verified by the network bank server, and the transaction is performed if the at least one second signed transaction data is successfully verified.
  • With the transaction method according to this embodiment, an identity of the bank may be determined uniquely from the bank identification. Therefore, a person may be prevented from impersonating a bank to send transaction data, such that it is ensured that the transaction data is real data sent by a bank, thus improving the security of the electronic transaction.
  • Fig. 5 is a flow chart of a transaction method according to yet another embodiment of the present disclosure.
  • As shown in Fig. 5, the transaction method according to embodiments of the present disclosure may comprise following steps.
  • At step S501, first signed transaction data and a pre-stored identification of a first electronic signature token are sent by the first electronic signature token to a network bank server. The identification of the first electronic signature token may be configured to determine an identity of the first electronic signature token uniquely.
  • At step S502, the first signed transaction data is verified by the network bank server, and the transaction data and the identification of the first electronic signature token are sent to at least one second electronic signature token if the first signed transaction data is successfully verified.
  • At step S503, the transaction data and the identification of the first electronic signature token are indicated by the at least one second electronic signature token for confirming by a user the transaction data and an identity of an initiator initiating the transaction.
  • At step S504, a user confirmation input by the user after confirming that the transaction data and the identity of the initiator are correct is received by the at least one second electronic signature token.
  • At step S505, a second signature is signed by the at least one second electronic signature token on the transaction data to obtain at least one second signed transaction data and the at least one second transaction data is sent to the network bank server.
  • At step S506, the at least one second signed transaction data is verified by the network bank server, and the transaction is performed if the at least one second signed transaction data is successfully verified.
  • With the transaction method according to this embodiment, during the transaction, the network bank server may determine an identity of the first electronic signature token according to the identification of the first electronic signature token, such that an imposter may be prevented from sending transaction data, thus ensuring the security of the transaction.
  • It should be understood that, a combination of the transaction method illustrated in Fig. 4 and the transaction method illustrated in Fig. 5 may be implemented, that is, the identification of the first electronic signature token and the bank identification are used together to further ensure the security of a transaction.
  • Although explanatory embodiments have been shown and described, it would be appreciated by those skilled in the art that the above embodiments cannot be construed to limit the present disclosure, and changes, alternatives, and modifications can be made in the embodiments without departing from spirit, principles and scope of the present disclosure.

Claims (12)

  1. A transaction system, comprising:
    a first electronic signature token, configured to sign a first signature on transaction data so as to obtain first signed transaction data, and to send the first signed transaction data;
    a network bank server, configured to receive the first signed transaction data sent by the first electronic signature token, to verify the first signed transaction data, and to send the transaction data if the first signed transaction data is successfully verified; and
    at least one second electronic signature token, configured to receive the transaction data sent by the network bank server, to verify the transaction data, to receive a user confirmation if the transaction data is successfully verified, to sign a second signature on the transaction data so as to obtain second signed transaction data, and to send the second signed transaction data to the network bank server,
    wherein the network bank server is further configured to verify the second signed transaction data, and to perform a transaction if the second signed transaction data is successfully verified.
  2. The transaction system according to claim 1, further comprising:
    a first terminal, configured to receive the first signed transaction data sent by the first electronic signature token, and to forward the first signed transaction data to the network bank server; and
    at least one second terminal, wherein each second terminal corresponds to one second electronic signature token, and is configured to receive the transaction data sent by the network bank server, to forward the transaction data to the corresponding second electronic signature token, to receive the second signed transaction data sent by the corresponding second electronic signature token, and to forward the second signed transaction data to the network bank server.
  3. The transaction system according to claim 1, wherein the first electronic signature token is further configured to send a pre-stored identification of the first electronic signature token to the network bank server, and the network bank server is further configured to send the identification of the first electronic signature token to the at least one second electronic signature token, and the at least one second electronic signature token is further configured to confirm the identification of the first electronic signature token.
  4. The transaction system according to claim 1, wherein the network bank server is further configured to send a bank identification for the transaction to the at least one second electronic signature token, and the at least one second electronic signature token is further configured to confirm the bank identification.
  5. The transaction system according to claim 1, wherein the system comprises a plurality of second electronic signature tokens.
  6. The transaction system according to claim 1, wherein the network bank server is further configured to receive a plurality of second signed transaction data sent by the plurality of second electronic signature tokens, to verify the plurality of second signed transaction data respectively and to perform the transaction if a predetermined percentage of the plurality of second signed transaction data is successfully verified.
  7. A transaction method, comprising:
    sending by a first electronic signature token first signed transaction data to a network bank server;
    verifying by the network bank server the first signed transaction data, and sending the transaction data to at least one second electronic signature token if the first signed transaction data is successfully verified;
    indicating by the at least one second electronic signature token the transaction data for confirming by a user;
    receiving by the at least one second electronic signature token a user confirmation input by the user after confirming that the transaction data is correct;
    signing by the at least one second electronic signature token a second signature on the transaction data to obtain at least one second signed transaction data and
    sending the at least one second transaction data to the network bank server; and verifying by the network bank server the at least one second signed transaction data, and performing a transaction if the at least one second signed transaction data is successfully verified.
  8. The transaction method according to claim 7, further comprising:
    sending by the first electronic signature token the first signed transaction data to a first terminal;
    forwarding by the first terminal the first signed transaction data to the network bank server.
  9. The transaction method according to claim 7, further comprising:
    sending by the network bank server the transaction data to at least one second terminal;
    forwarding by the at least one second terminal the transaction data to the at least one second electronic signature token respectively.
  10. The transaction method according to claim 7, further comprising:
    sending a bank identification for the transaction to the at least one second electronic signature token when the transaction data is sent by the network bank server to the at least one second electronic signature token;
    verifying by the at least one second electronic signature token the bank identification, and indicating the transaction data if the bank identification is successfully verified.
  11. The transaction method according to claim 7, further comprising:
    sending a pre-stored identification of the first electronic signature token to the network bank server when the first signed transaction data is sent by the first electronic signature token to the network bank server;
    sending by the network bank server the identification of the first electronic signature token to the at least one second electronic signature token;
    indicating by the at least one second electronic signature token the identification of the first electronic signature token such that the user confirms an identity of an initiator initiating the transaction.
  12. The transaction method according to claim 7, wherein when the network bank server verifies a plurality of second signed transaction data sent by a plurality of second electronic signature tokens, the transaction is performed if a predetermined percentage of the plurality of second signed transaction data is successfully verified.
EP13850096.2A 2012-11-02 2013-10-30 Transaction system and transaction method Withdrawn EP2916483A4 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210433981.XA CN102983973B (en) 2012-11-02 2012-11-02 Transaction system and method for commerce
PCT/CN2013/086206 WO2014067456A1 (en) 2012-11-02 2013-10-30 Transaction system and transaction method

Publications (2)

Publication Number Publication Date
EP2916483A1 true EP2916483A1 (en) 2015-09-09
EP2916483A4 EP2916483A4 (en) 2016-07-13

Family

ID=47857735

Family Applications (1)

Application Number Title Priority Date Filing Date
EP13850096.2A Withdrawn EP2916483A4 (en) 2012-11-02 2013-10-30 Transaction system and transaction method

Country Status (4)

Country Link
US (1) US20150294310A1 (en)
EP (1) EP2916483A4 (en)
CN (1) CN102983973B (en)
WO (1) WO2014067456A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102983973B (en) * 2012-11-02 2018-11-30 天地融科技股份有限公司 Transaction system and method for commerce
CN104077689B (en) * 2013-10-30 2016-01-20 腾讯科技(深圳)有限公司 A kind of method of Information Authentication, relevant apparatus and system
US11055721B2 (en) 2013-10-30 2021-07-06 Tencent Technology (Shenzhen) Company Limited Method, device and system for information verification
US10210515B2 (en) * 2015-11-23 2019-02-19 Mastercard International Incorporated Systems and methods for use in verifying recurring transactions to payment accounts
CN106056419A (en) * 2015-11-25 2016-10-26 天地融科技股份有限公司 Method, system and device for realizing independent transaction by using electronic signature equipment
CN105654296A (en) * 2015-12-29 2016-06-08 中国建设银行股份有限公司 Authentication method and system
CN106021091B (en) * 2016-05-04 2019-05-17 上海携程商务有限公司 Internet bank's simulation system and method
CN108076079A (en) * 2016-11-09 2018-05-25 阿里巴巴集团控股有限公司 A kind of user information obtains system, method and device
CN114424231A (en) * 2019-09-25 2022-04-29 夏普Nec显示器解决方案株式会社 Electronic device, method for managing electronic device, and program

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5559887A (en) * 1994-09-30 1996-09-24 Electronic Payment Service Collection of value from stored value systems
US6970854B2 (en) * 2001-05-25 2005-11-29 Hewlett-Packard Development Company, L.P. System for remote signature writing
US20050044385A1 (en) * 2002-09-09 2005-02-24 John Holdsworth Systems and methods for secure authentication of electronic transactions
KR101503085B1 (en) * 2006-12-27 2015-03-16 넥타르 테라퓨틱스 Von willebrand factor- and factor viii-polymer conjugates having a releasable linkage
US8401968B1 (en) * 2008-03-27 2013-03-19 Amazon Technologies, Inc. Mobile group payments
CN101344945A (en) * 2008-08-22 2009-01-14 李东风 Method for protecting integrality of electro-check by digital signature
US8429078B2 (en) * 2008-09-11 2013-04-23 Visa U.S.A. Inc. Payment processing device signature verification
CN101588364B (en) * 2009-03-31 2012-08-08 飞天诚信科技股份有限公司 Signature method, device and system thereof
CN101556668A (en) * 2009-05-12 2009-10-14 中国工商银行股份有限公司 Data processing method of bank card and system
CN102202040B (en) * 2010-03-26 2014-06-04 联想(北京)有限公司 Client authentication method and device
WO2012139286A1 (en) * 2011-04-13 2012-10-18 北京天地融科技股份有限公司 Transaction information confirmation device, electronic signature tool and system, and electronic signature method
CN102184495B (en) * 2011-04-21 2016-09-28 天地融科技股份有限公司 A kind of method of network payment and system
CN102983973B (en) * 2012-11-02 2018-11-30 天地融科技股份有限公司 Transaction system and method for commerce

Also Published As

Publication number Publication date
CN102983973A (en) 2013-03-20
CN102983973B (en) 2018-11-30
WO2014067456A1 (en) 2014-05-08
EP2916483A4 (en) 2016-07-13
US20150294310A1 (en) 2015-10-15

Similar Documents

Publication Publication Date Title
EP2916483A1 (en) Transaction system and transaction method
US20210081928A1 (en) Systems and methods for linking devices to user accounts
CN104618116B (en) A kind of cooperative digital signature system and its method
JP2012530311A5 (en)
EP3009951A1 (en) Authenticated self-service terminal (sst) access
US9712525B2 (en) Validating biometrics without special purpose readers
US10839362B2 (en) Offline pin authentication method and system for IC card
CN112055019B (en) Method for establishing communication channel and user terminal
CN103380592A (en) Method, server and system for authentication of a person
US20150052063A1 (en) Method for the Mutual Authentication of Entities Having Previously Initiated an Online Transaction
US20200196143A1 (en) Public key-based service authentication method and system
US20150310441A1 (en) Transaction system method, electronic signature tool, and network bank server authentication
WO2015109958A1 (en) Data processing method based on negotiation key, and mobile phone
EP2908262B1 (en) Security Token, Transaction Execution Method, and Computer Program Product
WO2015158173A1 (en) Agreement key-based data processing method
CN117336092A (en) Client login method and device, electronic equipment and storage medium
CN108711053B (en) Operation control system and operation control method
CN108174370B (en) Bluetooth secure connection method, device, terminal and computer readable storage medium
EP3035588A1 (en) System for verifying a one-time password
CN110061841B (en) Signature method, signature verification method and signature verification device
JP2009536796A (en) PC external signature apparatus having wireless communication capability
WO2017063545A1 (en) Identity information input method and system relevant to transaction data
JP2019134268A (en) Registration system and registration method
EP3751784B1 (en) Digital signature system based on a cloud of dedicated local devices
CN202841157U (en) Transaction system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20150416

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

DAX Request for extension of the european patent (deleted)
RA4 Supplementary search report drawn up and despatched (corrected)

Effective date: 20160613

RIC1 Information provided on ipc code assigned before grant

Ipc: H04L 29/06 20060101ALI20160607BHEP

Ipc: G06Q 20/38 20120101ALI20160607BHEP

Ipc: G06Q 20/40 20120101ALI20160607BHEP

Ipc: H04L 9/32 20060101AFI20160607BHEP

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: EXAMINATION IS IN PROGRESS

17Q First examination report despatched

Effective date: 20181130

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN WITHDRAWN

18W Application withdrawn

Effective date: 20190912